Mythos: What It Actually Means and What It Does Not
Recently, Anthropic, one of the leading companies on the AI scene, was about to release its new model called “Mythos”. To rarely seen levels of interest, they announced that the model would be held back and kept strictly closed to specially selected partners working with development, infrastructure and security. The reason? The model, which is essentially a general-purpose model, has through its coding capability proven so capable of identifying vulnerabilities and creating exploits that they consider it too dangerous to release.
There are two reactions dominating the subsequent discussion. One is that this is one of the most important moments in the history of technology. The other is that it is well-crafted marketing from a company that knows how to generate headlines. Both reactions miss what is actually interesting.
The truth is that Mythos is neither the apocalypse nor a bluff. It is a clear pattern we need to understand, and one with consequences that extend far beyond cybersecurity.
It Is Not a Hacking Tool That Happened to Get Smart
The first and most important thing to understand about Mythos is what it actually is. It is not a purpose-built attack tool. It was not trained to hack. It is a general-purpose frontier model, built to excel at code, reasoning, autonomy and complex long-horizon tasks.
Nobody designed Mythos to become a security threat. It became one when the model grew capable enough to genuinely understand how complex code actually works. Anthropic states this plainly in its technical documentation: the capabilities emerged as a consequence of general improvements in code understanding and reasoning, not from any specialised training toward cybersecurity.
That is the insight that changes the picture, not just for Mythos but for what is yet to come. The question we should be asking is not what Mythos can do in cybersecurity, but what will come along uninvited next time, when the next generation of models makes the same leap in a different domain. We do not yet know that answer. But the pattern is now clear enough that we should treat it as a fact rather than a speculation.
What the Independent Evaluation Actually Shows
Much of the media coverage leans heavily on Anthropic’s own claims. It is reasonable to apply scrutiny to a company with commercial interests in Mythos being perceived as groundbreaking. That is why it is worth focusing on what the UK’s AI Security Institute, AISI, actually found in its independent evaluation. It is serious enough without any amplification.
On tasks rated as expert-level in cybersecurity, tasks that no AI model could complete at all before April 2025, Mythos succeeded 73 percent of the time. AISI also constructed a 32-step simulation of a full corporate network attack against a fictional company and found that Mythos completed the entire chain autonomously in three out of ten attempts.
AISI’s report notes that the test environment lacked active defenders and defensive tooling, and that it is therefore not possible to conclude that Mythos could autonomously attack well-defended systems in the real world. That is an important qualification. But the point stands: a year ago this capability did not exist. Now it does.
The Threshold Is Dropping and That Is the Real Problem
When people call Mythos a cyber weapon, they compress a more interesting truth into a more frightening word. State-sponsored actors and sophisticated criminal groups have always had access to advanced tools. What changes with Mythos, and with the class of models it represents, is not what the elite can do. It is what everyone else will soon be able to do.
Anthropic’s technical documentation makes this concrete: engineers without formal security training asked Mythos to find critical vulnerabilities and woke up the next morning to complete, working exploits. That is not a demonstration that AI can hack. It is a demonstration that the competency threshold for sophisticated security work just dropped dramatically.
What changes is not that sophisticated attacks suddenly exist. It is that they stop being rare. A capability that previously required years of expertise and sustained effort can now be directed by someone with neither. That does not make each individual attack more dangerous. It makes the total number of dangerous attacks vastly harder to contain.
Offensive Speed Against Defensive Speed
There is a structural problem that Mythos did not create but makes brutally visible. The attacking side now operates on a fundamentally different timescale than the defending side. A model works around the clock without interruption. Organisational decision-making does not. A model can find a vulnerability, assess whether it is exploitable, chain it together with other flaws and deliver a working proof-of-concept, all while your organisation’s patch cycle is still waiting on a steering committee and Change Advisory Boards.
This is not a technical problem. It is an organisational one. Change management, patch processes and risk acceptance frameworks were built for a threat environment that no longer applies. They assume the attacker is a human being with limited time, limited resources and a finite capacity to work in parallel. None of those assumptions hold any longer, and that requires us to fundamentally rethink our relationship to compliance and organisational governance.
This does not mean every organisation is immediately exposed. It means that organisations whose security posture rests on the hope that attackers are slower, less capable or easier to outlast than they are about to become should reconsider that assumption.
What We Actually Need to Do
What Mythos actually demands in practice is not new technology or new frameworks. It is that the foundational work gets done, consistently and without exceptions. Asset inventory. Patch discipline. Least privilege. Network segmentation. Dependency hygiene. Supply chain security. Active security monitoring with genuine response capability.
None of this is new. These are recommendations the security industry has been making for twenty years. What changes is that they move from the category of should do to the category of must be in place. Not because Mythos itself will attack your organisation, but because the class of tools it represents is now demonstrably possible, and the next generation of them will not be distributed with the same controlled caution.
But doing the foundational work better is not enough. The practical consequence for most organisations is that they should already now be planning for a security capability where a large part of the operational capacity is agent-based. If the attacking side moves toward increasingly autonomous and machine-speed capability, a security capability that primarily relies on human monitoring, triage and incident handling will gradually lose effectiveness. That does not mean people disappear from security work, but that their role changes. Agents need to take a larger share of the ongoing work of detection, analysis, validation and response, while human experts are responsible for governance, quality control, high-impact decisions and the continuous development of the protection. Whether that capability is built internally or purchased as a service is fundamentally secondary. What matters is that the organisation builds a security capability that can work at the same pace as the threat develops.
Mythos is in that sense a useful diagnostic. What it finds, the bugs, the exploit chains, the forgotten vulnerabilities, is material that sufficiently patient and capable attackers could always have found. Mythos makes it faster and cheaper. But the crack in the armour was already there.
That is an uncomfortable insight. It is also a useful one, because it points to what actually helps: stop building environments that can be broken by a single well-aimed exploit chain, and start building protection that keeps pace with the threat.
What Deserves More Thought
There are things that merit more consideration than they have received so far. Anthropic is a company with commercial interests. Project Glasswing is a genuine defensive initiative and simultaneously a well-constructed brand story. These things are not mutually exclusive, but they should be kept in mind when reading claims about the model’s capabilities.
The defensive coalition in Project Glasswing is in practice US-centred. For Europe and Sweden, that raises a concrete planning question: if equivalent offensive capability spreads through open source or less careful actors within a matter of months, and we have not had the same defensive head start, that is a structural asymmetry worth addressing now rather than when it arrives.
For OT environments, energy, water and transport, the advice to patch faster is insufficient. In those environments, patch cycles are long for technical safety reasons, not merely bureaucratic inertia. They are also the environments with the greatest societal consequences if an attack succeeds. Segmentation and resilience, the ability to limit the spread of a breach once it occurs, is a more relevant objective than perfect patch coverage.
Mythos is neither the final step toward a digital apocalypse nor an inflated PR exercise. It is a credible and independently verified step in a direction that cannot be reversed. The right conclusion is not to panic. It is to stop hoping that the threat landscape is something we will eventually grow out of, and to start building cybersecurity that holds up against the reality that is now proven and documented.
The warnings may turn out to be larger than the damage. But treating the underlying shift as imaginary would be a serious mistake.
Sources:
Anthropic red team report: technical overview of Mythos capabilities, exploit chains and test results: https://red.anthropic.com/2026/mythos-preview/
AISI independent evaluation: UK AI Security Institute, including the 73% result and the network attack simulation: https://www.aisi.gov.uk/blog/our-evaluation-of-claude-mythos-previews-cyber-capabilities
Project Glasswing: Anthropic’s official page with partner list, pricing and commitments: https://www.anthropic.com/glasswing
Scientific American: expert commentary balancing Anthropic’s own claims: https://www.scientificamerican.com/article/what-is-mythos-and-why-are-experts-worried-about-anthropics-ai-model/
Stay ahead with cyber insights
Newsletter
Stay ahead in cybersecurity! Sign up for Truesec’s newsletter to receive the latest insights, expert tips, and industry news directly to your inbox. Join our community of professionals and stay informed about emerging threats, best practices, and exclusive updates from Truesec.